Cortex M33 r0p4

CSV information ?

Status active
Valid from 13.02.2020
Valid until 13.02.2025
Scheme 🇳🇱 NL
Manufacturer Arm Limited
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ASE_TSS.2, ALC_FLR.1, EAL6+

Heuristics summary ?

Certificate ID: NSCIB-CC-202003-CR

Certificate ?

Extracted keywords

Security level
EAL6, EAL7, EAL6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ASE_TSS.2
Certificates
CC-20-202003
Evaluation facilities
Brightsight

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Creation date D:20200213160251+01'00'
Modification date D:20200213160645+01'00'
Pages 1
Creator NL-ARN-SAL-C
Producer KONICA MINOLTA bizhub C300i

Certification report ?

Extracted keywords

Randomness
RNG

Security level
EAL4, EAL6+, EAL6, EAL4+, EAL 6, EAL6 augmented, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2, ASE_TSS.1
Protection profiles
BSI-PP-0084-2014
Certificates
NSCIB-CC-202003-CR
Evaluation facilities
Brightsight

Side-channel analysis
JIL-COMP, JIL-AAPS, JIL

File metadata

Title Certification Report NSCIB-CC-202003-CR v1.1.docx
Author p647
Creation date D:20200617122500+02'00'
Pages 13
Creator pdfFactory Pro www.pdffactory.com
Producer pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)

Frontpage

Certificate ID NSCIB-CC-202003-CR
Certified item Cortex M33 r0p4
Certification lab Brightsight
Developer Arm Limited

Security target ?

Extracted keywords

Schemes
MAC
Randomness
RND

Trusted Execution Environments
SE

Security level
EAL6, EAL4, EAL6 augmented, EAL4 augmented
Claims
T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_SPM.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FDP_ACC.2, FDP_ACC, FDP_ACF.1, FDP_ACF, FDP_ACC.1, FDP_IFC.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FPT_FLS.1
Protection profiles
BSI-CC-PP-0084-2014

Side-channel analysis
Leak-Inherent, Physical Probing, Malfunction
Certification process
out of scope, Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery, 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out, transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This, to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but, contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in, This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation, must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of, This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are, 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This, is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20200114111242+01'00'
Modification date D:20200114111313+01'00'
Pages 53
Creator Acrobat PDFMaker 15 for Word
Producer Adobe PDF Library 15.0

Heuristics ?

Certificate ID: NSCIB-CC-202003-CR

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'NSCIB-CC-20-202003-CR'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1', 'txt_hash': 'aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '15e24a0559b88716a72f8fb08d727a5500e1e45ca75cc79ea30ed54b98a01fdf', 'txt_hash': '0b51504d1e0d68a40998fd130db4c6a17e4a5c48a2b19fa48c5f618f355b2d4f'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 631615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 53, '/Author': '', '/ContentTypeId': '0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84', '/CreationDate': "D:20200114111242+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/Document Type': '', '/ModDate': "D:20200114111313+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Security Classification': '', '/SourceModified': '', '/Title': '', '/_dlc_DocIdItemGuid': '8a4541cf-d2a4-4635-bb38-c025604d1781', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.arm.com/company/policies/trademarks', 'http://www.arm.com/', 'http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 173675, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20200213160251+01'00'", '/Creator': 'NL-ARN-SAL-C', '/ModDate': "D:20200213160645+01'00'", '/Producer': 'KONICA MINOLTA bizhub C300i', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 11, 'EAL4': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_SPM.1': 8, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 2, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.2': 10, 'FDP_ACC': 23, 'FDP_ACF.1': 23, 'FDP_ACF': 22, 'FDP_ACC.1': 11, 'FDP_IFC.1': 4}, 'FMT': {'FMT_MSA.3': 15, 'FMT_MSA': 38, 'FMT_MSA.1': 10, 'FMT_SMF.1': 10, 'FMT_SMF': 18, 'FMT_SMR.1': 11}, 'FPT': {'FPT_FLS.1': 1}}, 'cc_claims': {'T': {'T.RND': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2}, 'FI': {'Malfunction': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 94}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 12, 'Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, '205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This': 1, 'to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but': 1, 'contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, 'This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, 'must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of': 1, 'This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are': 1, '240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NL': {'CC-20-202003': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL6': 1, 'EAL7': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to [M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf.
    • The cert_filename property was set to CC-20-202003.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df', 'txt_hash': '45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 138797, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 13, '/Author': 'p647', '/CreationDate': "D:20200617122500+02'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)', '/Title': 'Certification Report NSCIB-CC-202003-CR v1.1.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.tuv.com/nl', 'mailto:[email protected]', 'http://www.sogisportal.eu', 'http://www.commoncriteriaportal.org']}}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-202003-CR', 'cert_item': 'Cortex M33 r0p4', 'developer': 'Arm Limited', 'cert_lab': ' Brightsight'}}.
    • The report_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-202003-CR': 13}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL6+': 3, 'EAL6': 5, 'EAL4+': 2, 'EAL 6': 1, 'EAL6 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP': 1}, 'ALC': {'ALC_FLR.1': 2}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL-COMP': 3, 'JIL-AAPS': 2, 'JIL': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to Certification Report NSCIB-CC-202003-CR v1.1.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
    • The cert_id property was set to NSCIB-CC-202003-CR.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to NSCIB-CC-20-202003-CR.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cortex M33 r0p4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-202003.pdf",
  "dgst": "d9414c80a0ee7958",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-202003-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-20-202003-CR",
      "cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/cc-20-202003.pdf",
      "level": "EAL6 augmented with ALC_FLR.1 and ASE_TSS.2",
      "manufacturer": "Arm Limited",
      "manufacturer_link": "http://www.arm.com",
      "product": "Cortex M33 r0p4",
      "report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/06/certification-report-nscib-cc-202003-cr-v1.1.pdf",
      "scheme": "NSCIB",
      "target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/m33-stl-arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Arm Limited",
  "manufacturer_web": "https://www.arm.com",
  "name": "Cortex M33 r0p4",
  "not_valid_after": "2025-02-13",
  "not_valid_before": "2020-02-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "CC-20-202003.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-20-202003": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20200213160251+01\u002700\u0027",
      "/Creator": "NL-ARN-SAL-C",
      "/ModDate": "D:20200213160645+01\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C300i",
      "pdf_file_size_bytes": 173675,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "Certification Report NSCIB-CC-202003-CR v1.1.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-202003-CR",
        "cert_item": "Cortex M33 r0p4",
        "cert_lab": " Brightsight",
        "developer": "Arm Limited"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-202003-CR": 13
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL4+": 2,
          "EAL6": 5,
          "EAL6 augmented": 3,
          "EAL6+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 5,
          "JIL-AAPS": 2,
          "JIL-COMP": 3
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "p647",
      "/CreationDate": "D:20200617122500+02\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)",
      "/Title": "Certification Report NSCIB-CC-202003-CR v1.1.docx",
      "pdf_file_size_bytes": 138797,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu",
          "http://www.tuv.com/nl",
          "mailto:[email protected]",
          "http://www.commoncriteriaportal.org"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 13
    },
    "st_filename": "[M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 8,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 8
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL6": 11,
          "EAL6 augmented": 3
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 23,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 10,
          "FDP_ACF": 22,
          "FDP_ACF.1": 23,
          "FDP_IFC.1": 4
        },
        "FMT": {
          "FMT_MSA": 38,
          "FMT_MSA.1": 10,
          "FMT_MSA.3": 15,
          "FMT_SMF": 18,
          "FMT_SMF.1": 10,
          "FMT_SMR.1": 11
        },
        "FPT": {
          "FPT_FLS.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out": 1,
          "240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This": 1,
          "Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery": 1,
          "This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation": 1,
          "This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are": 1,
          "contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in": 1,
          "is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the": 1,
          "must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of": 1,
          "out of scope": 12,
          "to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but": 1,
          "transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6
        },
        "SCA": {
          "Leak-Inherent": 6,
          "Physical Probing": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 94
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/ContentTypeId": "0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84",
      "/CreationDate": "D:20200114111242+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 15 for Word",
      "/Document Type": "",
      "/ModDate": "D:20200114111313+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/Security Classification": "",
      "/SourceModified": "",
      "/Title": "",
      "/_dlc_DocIdItemGuid": "8a4541cf-d2a4-4635-bb38-c025604d1781",
      "pdf_file_size_bytes": 631615,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.arm.com/company/policies/trademarks",
          "http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html",
          "http://www.arm.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 53
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "ASE_TSS.2",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "15e24a0559b88716a72f8fb08d727a5500e1e45ca75cc79ea30ed54b98a01fdf",
      "txt_hash": "0b51504d1e0d68a40998fd130db4c6a17e4a5c48a2b19fa48c5f618f355b2d4f"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df",
      "txt_hash": "45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1",
      "txt_hash": "aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996"
    }
  },
  "status": "active"
}